Yealink SIP-T48G — настройка функций безопасности для защиты конфигурации [225/465]

Yealink SIP-T41P [225/465] Encrypting configuration files
Configuring Security Features
211
4. Select the desired value from the pull-down list of RTP Encryption (SRTP).
5. Click Confirm to accept the change.
Encrypted configuration files can be the provisioning server to
protect against unauthorized access and tampering of sensitive information (e.g., login
passwords, registration information). Yealink provides a configuration encryption tool
for encrypting configuration files. The encryption tool encrypts plaintext
<y0000000000xx>.cfg and <MAC>.cfg files (one by one or in batch) using 16-character
symmetric keys (the same or different keys for configuration files) and generates
encrypted configuration files with the same file name as before. This tool also encrypts
the plaintext 16-character symmetric keys using a fixed key, which is the same as the
one built in the IP phone, and generates new files named as <xx_Security>.enc (xx
indicates the name of the configuration file, for example, y000000000028_Security.enc
for y000000000028.cfg file). This tool generates another new file named as Aeskey.txt to
store the plaintext 16-character symmetric keys for each configuration file.
For a Microsoft Windows platform, you can use a Yealink-supplied encryption tool
"Config_Encrypt_Tool.exe" to encrypt the <y0000000000xx>.cfg and <MAC>.cfg files
respectively.
Note
Yealink also provides a configuration encryption tool (yealinkencrypt) for Linux platform
if required. For more information, refer to
Yealink Configuration Encryption Tool User
Guide
.

Содержание

Узнайте, как настроить функции безопасности для защиты конфигурационных файлов от несанкционированного доступа и подделки. Используйте инструменты шифрования для повышения безопасности.

Скачать